ISO27001:2022

ISO27001 Organisation Controls

ISO27001 Annex A 5.1 Policies for information security

ISO27001 Annex A 5.2 Information Security Roles and Responsibilities

ISO27001 Annex A 5.3 Segregation of duties

ISO27001 Annex A 5.4 Management responsibilities

ISO27001 Annex A 5.5 Contact with authorities

ISO27001 Annex A 5.6 Contact with special interest groups

ISO27001 Annex A 5.7 Threat intelligence

ISO27001 Annex A 5.8 Information security in project management

ISO27001 Annex A 5.9 Inventory of information and other associated assets

ISO27001 Annex A 5.10 Acceptable use of information and other associated assets

ISO27001 Annex A 5.11 Return of assets

ISO27001 Annex A 5.12 Classification of information

ISO27001 Annex A 5.13 Labelling of information

ISO27001 Annex A Cotrol 5.14 Information transfer

ISO27001 Annex A 5.15 Access control

ISO27001 Annex A 5.16 Identity management

ISO27001 Annex A 5.17 Authentication information

ISO27001 Annex A 5.18 Access rights

ISO27001 Annex A 5.19 Information security in supplier relationships

ISO27001 Annex A 5.20 Addressing information security within supplier agreements

ISO27001 Annex A 5.21 Managing information security in the ICT supply chain

ISO27001 Annex A 5.22 Monitoring, review and change management of supplier services

ISO27001 Annex A 5.23 Information security for use of cloud services

ISO27001 Annex A 5.24 Information security incident management planning and preparation

ISO27001 Annex A 5.25 Assessment and decision on information security events

ISO27001 Annex A 5.26 Response to information security incidents

ISO27001 Annex A 5.27 Learning from information security incidents

ISO27001 Annex A 5.28 Collection of evidence

ISO27001 Annex A 5.29 Information security during disruption

ISO 27001 Annex A Cotrol 5.30 ICT readiness for business continuity

ISO27001 Annex A 5.31 Identification of legal, statutory, regulatory and contractual requirements

ISO27001 Annex A 5.32 Intellectual property rights

ISO27001 Annex A 5.33 Protection of records

ISO27001 Annex A 5.34 Privacy and protection of PII

ISO27001 Annex A 5.35 Independent review of information security

ISO27001 Annex A 5.36 Compliance with policies and standards for information security

ISO27001 Annex A 5.37 Documented operating procedures

ISO27001 Technical Controls

ISO27001 Annex A 8.1 User Endpoint Devices

ISO27001 Annex A 8.2 Privileged Access Rights

ISO27001 Annex A 8.3 Information Access Restriction

ISO27001 Annex A 8.4 Access To Source Code

ISO27001 Annex A 8.5 Secure Authentication

ISO27001 Annex A 8.6 Capacity Management

ISO27001 Annex A 8.7 Protection Against Malware

ISO27001 Annex A 8.8 Management of Technical Vulnerabilities

ISO27001 Annex A 8.9 Configuration Management 

ISO27001 Annex A 8.10 Information Deletion

ISO27001 Annex A 8.11 Data Masking

ISO27001 Annex A 8.12 Data Leakage Prevention

ISO27001 Annex A 8.13 Information Backup

ISO27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO27001 Annex A 8.15 Logging

ISO27001 Annex A 8.16 Monitoring Activities

ISO27001 Annex A 8.17 Clock Synchronisation

ISO27001 Annex A 8.18 Use of Privileged Utility Programs

ISO27001 Annex A 8.19 Installation of Software on Operational Systems

ISO27001 Annex A 8.20 Network Security

ISO27001 Annex A 8.21 Security of Network Services

ISO27001 Annex A 8.22 Segregation of Networks

ISO27001 Annex A 8.23 Web Filtering

ISO27001 Annex A 8.24 Use of Cryptography

ISO27001 Annex A 8.25 Secure Development Life Cycle

ISO27001 Annex A 8.26 Application Security Requirements

ISO27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO27001 Annex A 8.28 Secure Coding

ISO27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO27001 Annex A 8.30 Outsourced Development

ISO27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO27001 Annex A 8.32 Change Management

ISO27001 Annex A 8.33 Test Information

ISO27001 Annex A 8.34 Protection of information systems during audit testing

Home / ISO 27001 Clauses / The Ultimate Guide to ISO 27001 Clause 6.1.1: Planning General

The Ultimate Guide to ISO 27001 Clause 6.1.1: Planning General

Last updated Sep 10, 2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

What is ISO 27001 Clause 6.1.1?

ISO 27001 Clause 6.1.1 comes under ISO 27001 Clause 6 and relates directly to planning. It is a relatively easy clause to satisfy with ISO 27001 templates. To implement ISO 27001 and go for ISO 27001 certification means that you must satisfy this requirement.

What are the ISO 27001:2022 Changes to Clause 6.1.1?

Brace yourself. The massive update was to remove the word ‘and’ from 6.1.1 b.

Requirement

This clause is about planning and you have to demonstrate a couple of things.

You will demonstrate, show and evidence that when you planned your information security management system that you took into account the issues in ISO 27001 Clause 4.1 Understanding the organisation and its context and the requirements that you identified in ISO 27001 Clause 4.2 Understanding the needs and expectations of interested parties.

In addition you are going to work out the risks and opportunities that will address the following points

  • that your information security management system can achieve its intended outcome(s)
  • that you can prevent, or reduce, undesired effects
  • that we can achieve continual improvement

You are going to plan, document and evidence

  • actions to address these risks and opportunities
  • how to integrate and implement these actions into your information security management system processes
  • how to evaluate the effectiveness of these actions

Definition

ISO 27001 defines ISO 27001 clause 6.1.1 as:

When planning for the information security management system, the organisation shall consider the issues referred to in 4.1 and the requirements referred to in 4.2 and determine the risks and opportunities that need to be addressed to:

a) ensure the information security management system can achieve its intended outcome(s);

b) prevent, or reduce, undesired effects

c) achieve continual improvement.

The organisation shall plan:

d) actions to address these risks and opportunities; and

e) how to

1) integrate and implement these actions into its information security management system processes; and

2) evaluate the effectiveness of these actions.

ISO 27001:2022 Clause 6.1.1 Planning General

How to implement ISO 27001 clause 6.1.1

There are a number of ways to meet the requirements of the ISO 27001 clause when going for ISO 27001 certification but an effective fast track is the use of ISO 27001 templates. The following ISO 27001 templates documents will meet the demands of ISO 27001 clause 6.1.1.

Implement Risk Management Policy

You will implement a Risk Management Policy that sets out your approach to risk management.

ISO 27001 Risk Management Policy Template

Implement Risk Process

You will implement your Risk Management Process that sets out how you manage risk.

ISO 27001 Risk Management Procedure Template

Implement Risk Register

You will implement the Risk Register to capture, manages and reports risks. These are reported to and overseen by the Management Review Team. 

ISO 27001 Risk Register Template

Implement Continual Improvement Policy

Risk Management is part of the continual improvement and you will implement your Continual Improvement Policy

ISO 27001 Continual Improvement Policy-Black

ISO 27001 Clause 6.1.1 Implementation Checklist

Planning General ISO 27001 Clause 6.1.1 Implementation Checklist:

1. Identify Information Security Risks

Determine potential threats and vulnerabilities that could impact the confidentiality, integrity, and availability of information.

Challenge: Difficulty in comprehensively identifying all potential risks, especially emerging ones. Lack of expertise in risk assessment methodologies.

Solution: Utilise a structured risk assessment methodology (e.g., ISO 31000), involve diverse interested parties (IT, legal, business units), and conduct regular threat intelligence reviews. Consider using automated risk assessment tools.

2. Identify Information Security Opportunities

Explore potential improvements to the ISMS, such as new technologies, process enhancements, or training programs.

Challenge: Overlooking opportunities due to a focus on risks. Difficulty in quantifying the benefits of opportunities.

Solution: Actively seek opportunities through brainstorming sessions, industry research, and feedback from employees and customers. Develop clear criteria for evaluating the potential value of opportunities.

3. Analyse Risks

Evaluate the likelihood and impact of identified risks to prioritise them.

Challenge: Subjectivity in risk assessment. Lack of reliable data for estimating likelihood and impact.

Solution: Use a consistent risk assessment scale and criteria. Gather historical data and expert opinions to support estimations. Document the rationale behind risk ratings.

4. Analyse Opportunities

Assess the potential benefits and feasibility of identified opportunities.

Challenge: Difficulty in comparing opportunities with different types of benefits (e.g., cost savings vs. improved security).

Solution: Develop a framework for evaluating opportunities based on factors like cost, effort, impact on security, and alignment with business objectives.

5. Determine Risk Treatment Options

Select appropriate actions to mitigate or manage risks, such as avoidance, transfer, mitigation, or acceptance.

Challenge: Choosing the most cost-effective and appropriate treatment option. Difficulty in implementing complex mitigation measures.

Solution: Conduct a cost-benefit analysis for each treatment option. Prioritise treatments based on risk level and feasibility. Develop detailed implementation plans for chosen treatments.

6. Determine Opportunity Implementation Plans

Define how identified opportunities will be realised, including resources, timelines, and responsibilities.

Challenge: Difficulty in securing resources for implementing opportunities. Lack of clear ownership and accountability.

Solution: Develop a project plan for each opportunity, including clear objectives, tasks, timelines, and resource allocation. Assign responsibilities and establish clear communication channels.

7. Establish Objectives for Risk Treatment and Opportunity Implementation

Define specific, measurable, achievable, relevant, and time-bound (SMART) objectives for risk reduction and opportunity realisation.

Challenge: Setting unrealistic or unmeasurable objectives. Difficulty in tracking progress towards objectives.

Solution: Involve interested parties in setting objectives. Define clear metrics for measuring progress. Regularly monitor and report on progress.

8. Develop a Risk Treatment Plan

Document the chosen risk treatment options, implementation details, responsible parties, and timelines.

Challenge: Difficulty in maintaining and updating the risk treatment plan. Lack of integration with other ISMS processes.

Solution: Use a centralised risk register or management system to document and track risk treatments. Regularly review and update the plan as needed. Integrate the plan with other ISMS processes, such as incident management and change management.

9. Develop an Opportunity Implementation Plan

Document the chosen opportunities, implementation details, responsible parties, and timelines.

Challenge: Similar to risk treatment plans, keeping the opportunity implementation plan up-to-date and integrated can be challenging.

Solution: Mirror the solutions for risk treatment plans: use centralised systems, regular reviews, and integration with other ISMS processes.

10. Communicate

Communicate risk and opportunity information to relevant interested parties and seek their input.

Challenge: Difficulty in communicating complex technical information to non-technical audiences. Lack of interested parties engagement.

Solution: Tailor communication to the audience. Use visual aids and plain language. Actively solicit feedback and involve interested parties in decision-making. Establish regular communication channels.

ISO 27001 Clause 6.1.1 Audit Checklist

How to audit ISO 27001 Clause 6.1.1 Planning General:

1. Review the Risk Assessment Methodology

Verify the existence and appropriateness of a documented risk assessment methodology.

  • Document review (policies, procedures)
  • interviews with risk management personnel
  • comparison against ISO 31000 principles
  • observation of a risk assessment in progress

2. Examine Risk Registers and Documentation

Inspect the risk register for completeness, accuracy, and evidence of risk analysis (likelihood and impact).

  • Document review (risk register, risk assessment reports)
  • data analysis (trends in risk levels)
  • sampling of risk entries for detailed review
  • interviews with risk owners

3. Evaluate the Identification of Opportunities

Confirm the process for identifying opportunities for ISMS improvement.

  • Interviews with management and staff
  • analysis of improvement logs and project proposals
  • review of strategic planning documents

4. Assess the Risk Treatment Process

Verify the defined process for selecting and implementing risk treatment options.

  • Document review (policies, procedures)
  • interviews with risk management personnel
  • review of risk treatment decisions and their rationale
  • walkthrough of a risk treatment selection process

5. Evaluate Opportunity Implementation Plans

Review plans for implementing identified opportunities.

  • Document review (project plans, implementation schedules)
  • interviews with project managers
  • review of resource allocation documentation
  • observation of opportunity implementation activities

6. Verify the Establishment of Objectives

Confirm the existence of SMART objectives for risk treatment and opportunity implementation.

  • Document review (ISMS objectives, risk treatment plans)
  • interviews with management
  • analysis of performance metrics and reports
  • review of strategic plans

7. Examine Risk Treatment and Opportunity Implementation Plans

Inspect documented plans for details on chosen options, implementation steps, responsibilities, and timelines.

  • Document review (risk treatment plans, project plans)
  • walkthrough of an implementation plan
  • interviews with responsible parties
  • review of change management records

8. Review Evidence of Implementation

Gather evidence of implemented risk treatments and opportunity implementation plans.

  • Document review (policies, procedures, training records, system configurations, test results)
  • observation of processes
  • interviews with staff
  • penetration testing (for technical controls)

9. Evaluate Communication and Consultation

Check processes for communicating risk and opportunity information to stakeholders.

  • Interviews with stakeholders
  • review of communication logs and meeting minutes
  • analysis of communication effectiveness surveys
  • review of stakeholder feedback mechanisms

10. Assess the Effectiveness of Actions

Evaluate the effectiveness of implemented actions in achieving objectives.

  • Analysis of performance data (e.g., incident rates, vulnerability scan results)
  • review of management review outputs
  • interviews with management and staff
  • benchmarking against industry best practices

How to comply with ISO 27001 Clause 6.1.1 Planning

Time needed: 1 day

How to comply with ISO 27001 Clause 6.1.1 Planning

  1. Build your information security management system (ISMS)

    Using the ISO 27001 Toolkit to fast track your implementation, build your information security management system following the step by step guides and videos.

  2. Implement your risk management policy

    Implement the risk management policy that sets out what you do for risk management and what your risk appetite is.

  3. Implement your risk management process

    Implement your risk management process that shows how you manage risk, how you identify risk, how you asses risk, how you accept risk and the different levels of risk acceptance.

  4. Manage your risk via a risk register

    Implement a risk register that allows you to fully manage, record and report on risk including residual risk.

  5. Effectively and regularly report to the Management Review Team

    Ensure that you report to the Management Review at least once a quarter and follow the structured management team meeting agenda as dictated by the ISO 27001 standard.

Watch the Video

For a complete visual guide to this process, check out our video tutorial: How to implement ISO 27001 Clause 6.1.1

Stuart Barker
ISO 27001 Expert and Thought Leader

ISO 27001 Toolkit Business Edition

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.